首页 > 最新文献

International Journal of Innovative Computing Information and Control最新文献

英文 中文
A Useful and Effective Method for Selecting a Smart Controller for SDN Network Design and Implement SDN网络设计与实现中智能控制器的有效选择方法
Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-09-13 DOI: 10.11113/ijic.v13n1-2.417
Mohammed Mousa Rashid, Nadia Adnan Shiltagh Al-Jamali
Software Defined Networking (SDN) is a modern network architectural model that manages network traffic using software. SDN is a networking scenario that modifies the conventional network design by combining all control features into a single place and making all choices centrally. Controllers are the "brains" of SDN architecture since they are responsible for making control decisions and routing packets at the same time. The capacity for centralized decision-making on routing improves the performance of the network. SDN's growing functionality and uses have led to the development of many controller systems. Every SDN controller idea or design must prioritize the control plane since it is the most crucial part of the SDN architecture. Studies have been done to examine, analyze, and evaluate the relative advantages of the many controllers that have been created in recent years. In this paper, finding the perfect controller based on derived needs (for example, the controller must have a "Java" or "Python" interface), a matching process compares controller features with requirements.
软件定义网络(SDN)是一种使用软件管理网络流量的现代网络体系结构模型。SDN是一种改变传统网络设计的网络场景,它将所有的控制功能集中到一个地方,并集中进行所有的选择。控制器是SDN架构的“大脑”,因为它们同时负责做出控制决策和路由数据包。集中决策路由的能力提高了网络的性能。SDN日益增长的功能和用途导致了许多控制器系统的发展。每个SDN控制器的想法或设计都必须优先考虑控制平面,因为它是SDN架构中最关键的部分。研究人员对近年来出现的许多控制器的相对优势进行了检查、分析和评估。在本文中,根据派生需求(例如,控制器必须具有“Java”或“Python”接口)找到完美的控制器,将控制器特性与需求进行匹配过程。
{"title":"A Useful and Effective Method for Selecting a Smart Controller for SDN Network Design and Implement","authors":"Mohammed Mousa Rashid, Nadia Adnan Shiltagh Al-Jamali","doi":"10.11113/ijic.v13n1-2.417","DOIUrl":"https://doi.org/10.11113/ijic.v13n1-2.417","url":null,"abstract":"Software Defined Networking (SDN) is a modern network architectural model that manages network traffic using software. SDN is a networking scenario that modifies the conventional network design by combining all control features into a single place and making all choices centrally. Controllers are the \"brains\" of SDN architecture since they are responsible for making control decisions and routing packets at the same time. The capacity for centralized decision-making on routing improves the performance of the network. SDN's growing functionality and uses have led to the development of many controller systems. Every SDN controller idea or design must prioritize the control plane since it is the most crucial part of the SDN architecture. Studies have been done to examine, analyze, and evaluate the relative advantages of the many controllers that have been created in recent years. In this paper, finding the perfect controller based on derived needs (for example, the controller must have a \"Java\" or \"Python\" interface), a matching process compares controller features with requirements.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135689705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid of Supervised Learning and Optimization Algorithm for Optimal Detection of IoT Distributed Denial of Service Attacks 基于监督学习和优化算法的物联网分布式拒绝服务攻击优化检测
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-05-30 DOI: 10.11113/ijic.v13n1.329
T. Farid, M. Sirat
The high-speed internet has led to the development of Internet of Things (IoT) with a fundamental Three-Layer IoT architecture. However, small amount of un-indicative data captured at the end level of IoT network makes the edge IoT devices susceptible to cyber-security attacks aimed at its transport layer. The Distributed Denial of Service (DDoS) poses significant cyber-security threat to the heterogenous IoT devices which are rendered vulnerable by ineffectiveness of conventional cybersecurity softwares. The literature reveals numerous studies that employed machine learning for the mitigation of IoT DDoS attacks but they lack in terms of an extensive investigation on optimization of machine learning classifiers. Therefore, this study first evaluates the prediction performance of machine learning classification algorithms trained on an authenticated/validated real-time IoT traffic dataset. The results reveal Logistic Regression (LR) as the most effective supervised machine learning classifier for detecting IoT DDoS attacks with a prediction accuracy of 97%. Following this, another investigation on the hybridization of LR with optimization algorithms yields Grasshopper Optimizer Algorithms (GOA) as the most effective optimizer in improving its prediction accuracy to 99%. Hence, the LR hybridized by GOA is developed as the optimal IoT DDoS Attack detection solution. Thus, the study serves to lay the foundation of a data-driven approach for the mitigation of the emerging variants of malicious IoT DDoS attacks such as zero-day attacks.
高速互联网推动了物联网(IoT)的发展,其基本架构为三层物联网(IoT)。然而,在物联网网络的终端级别捕获的少量非指示性数据使边缘物联网设备容易受到针对其传输层的网络安全攻击。分布式拒绝服务(DDoS)对异构物联网设备构成了重大的网络安全威胁,传统网络安全软件的有效性使这些设备变得脆弱。文献揭示了许多使用机器学习来缓解物联网DDoS攻击的研究,但它们缺乏对机器学习分类器优化的广泛调查。因此,本研究首先评估了在经过认证/验证的实时物联网流量数据集上训练的机器学习分类算法的预测性能。结果显示,逻辑回归(LR)是检测物联网DDoS攻击最有效的监督机器学习分类器,预测准确率为97%。在此之后,另一项关于LR与优化算法杂交的研究表明,Grasshopper Optimizer algorithms (GOA)是最有效的优化器,可以将其预测精度提高到99%。因此,本文提出了混合GOA的LR作为物联网DDoS攻击检测的最佳方案。因此,该研究为缓解恶意物联网DDoS攻击(如零日攻击)的新变体奠定了数据驱动方法的基础。
{"title":"Hybrid of Supervised Learning and Optimization Algorithm for Optimal Detection of IoT Distributed Denial of Service Attacks","authors":"T. Farid, M. Sirat","doi":"10.11113/ijic.v13n1.329","DOIUrl":"https://doi.org/10.11113/ijic.v13n1.329","url":null,"abstract":"The high-speed internet has led to the development of Internet of Things (IoT) with a fundamental Three-Layer IoT architecture. However, small amount of un-indicative data captured at the end level of IoT network makes the edge IoT devices susceptible to cyber-security attacks aimed at its transport layer. The Distributed Denial of Service (DDoS) poses significant cyber-security threat to the heterogenous IoT devices which are rendered vulnerable by ineffectiveness of conventional cybersecurity softwares. The literature reveals numerous studies that employed machine learning for the mitigation of IoT DDoS attacks but they lack in terms of an extensive investigation on optimization of machine learning classifiers. Therefore, this study first evaluates the prediction performance of machine learning classification algorithms trained on an authenticated/validated real-time IoT traffic dataset. The results reveal Logistic Regression (LR) as the most effective supervised machine learning classifier for detecting IoT DDoS attacks with a prediction accuracy of 97%. Following this, another investigation on the hybridization of LR with optimization algorithms yields Grasshopper Optimizer Algorithms (GOA) as the most effective optimizer in improving its prediction accuracy to 99%. Hence, the LR hybridized by GOA is developed as the optimal IoT DDoS Attack detection solution. Thus, the study serves to lay the foundation of a data-driven approach for the mitigation of the emerging variants of malicious IoT DDoS attacks such as zero-day attacks.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"19 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78819598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparing Malware Attack Detection using Machine Learning Techniques in IoT Network Traffic 比较物联网网络流量中使用机器学习技术的恶意软件攻击检测
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-05-30 DOI: 10.11113/ijic.v13n1.384
Yee Zi Wei, Marina Md-Arshad, Adlina Abdul Samad, Norafida Ithnin
Most IoT devices are designed and built for cheap and basic functions, therefore, the security aspects of these devices are not taken seriously. Yet, IoT devices tend to play an important role in this era, where the amount of IoT devices is predicted to exceed the number of traditional computing devices such as desktops and laptops. This causes more and more cybersecurity attacks to target IoT devices and malware attack is known to be the most common attack in IoT networks. However, most research only focuses on malware detection in traditional computing devices. The purpose of this research is to compare the performance of Random Forest and Naïve Bayes algorithm in terms of accuracy, precision, recall and F1-score in classifying the malware attack and benign traffic in IoT network traffic. Research is conducted with the Aposemat IoT-23 dataset, a labelled dataset that contains IoT malware infection traffic and IoT benign traffic. To determine the data in IoT network traffic packets that are useful for threat detection, a study is conducted and the threat data is cleaned up and prepared using RStudio and RapidMiner Studio. Random Forest and Naïve Bayes algorithm is used to train and classify the cleaned dataset. Random Forest can prevent the model from overfitting while Naïve Bayes requires less training time. Lastly, the accuracy, precision, recall and F1-score of the machine learning algorithms are compared and discussed. The research result displays the Random Forest as the best machine learning algorithm in classifying the malware attack traffic.
大多数物联网设备都是为廉价和基本功能而设计和制造的,因此,这些设备的安全方面没有得到认真对待。然而,物联网设备在这个时代将发挥重要作用,物联网设备的数量预计将超过台式机和笔记本电脑等传统计算设备的数量。这导致越来越多的网络安全攻击针对物联网设备,恶意软件攻击是物联网网络中最常见的攻击。然而,大多数研究只关注传统计算设备中的恶意软件检测。本研究的目的是比较Random Forest和Naïve Bayes算法在IoT网络流量中对恶意攻击和良性流量进行分类的准确率、精密度、召回率和f1评分。研究使用Aposemat IoT-23数据集进行,这是一个包含物联网恶意软件感染流量和物联网良性流量的标记数据集。为了确定物联网网络流量数据包中对威胁检测有用的数据,进行了一项研究,并使用RStudio和RapidMiner Studio对威胁数据进行了清理和准备。使用随机森林和Naïve贝叶斯算法对清洗后的数据集进行训练和分类。随机森林可以防止模型过拟合,而Naïve贝叶斯需要更少的训练时间。最后,对机器学习算法的正确率、精密度、召回率和f1分数进行了比较和讨论。研究结果表明,随机森林算法是对恶意攻击流量进行分类的最佳机器学习算法。
{"title":"Comparing Malware Attack Detection using Machine Learning Techniques in IoT Network Traffic","authors":"Yee Zi Wei, Marina Md-Arshad, Adlina Abdul Samad, Norafida Ithnin","doi":"10.11113/ijic.v13n1.384","DOIUrl":"https://doi.org/10.11113/ijic.v13n1.384","url":null,"abstract":"Most IoT devices are designed and built for cheap and basic functions, therefore, the security aspects of these devices are not taken seriously. Yet, IoT devices tend to play an important role in this era, where the amount of IoT devices is predicted to exceed the number of traditional computing devices such as desktops and laptops. This causes more and more cybersecurity attacks to target IoT devices and malware attack is known to be the most common attack in IoT networks. However, most research only focuses on malware detection in traditional computing devices. The purpose of this research is to compare the performance of Random Forest and Naïve Bayes algorithm in terms of accuracy, precision, recall and F1-score in classifying the malware attack and benign traffic in IoT network traffic. Research is conducted with the Aposemat IoT-23 dataset, a labelled dataset that contains IoT malware infection traffic and IoT benign traffic. To determine the data in IoT network traffic packets that are useful for threat detection, a study is conducted and the threat data is cleaned up and prepared using RStudio and RapidMiner Studio. Random Forest and Naïve Bayes algorithm is used to train and classify the cleaned dataset. Random Forest can prevent the model from overfitting while Naïve Bayes requires less training time. Lastly, the accuracy, precision, recall and F1-score of the machine learning algorithms are compared and discussed. The research result displays the Random Forest as the best machine learning algorithm in classifying the malware attack traffic.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89754652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fitting Time-varying Coefficients SEIRD Model to COVID-19 Cases in Malaysia 马来西亚新冠肺炎病例时变系数SEIRD模型拟合
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-05-30 DOI: 10.11113/ijic.v13n1.397
Norsyahidah Zulkarnain, Muhammad Salihi Abdul Hadi, N. Mohammad, I. Shogar
This paper proposes a compartmental Susceptible-Exposed-Infected-Recovered-Death (SEIRD) model for COVID-19 cases in Malaysia. This extended model is more relevant to describe the disease transmission than the SIRD model since the exposed (E) compartment represents individuals in the disease's incubation period. The mathematical model is a system of ordinary differential equations (ODEs) with time-varying coefficients as opposed to the conventional model with constant coefficients. This time dependency treatment is necessary as the epidemiological parameters such as infection rate β, recovery rate γ, and death rate μ usually change over time. However, this feature leads to an increasing number of unknowns needed to be solved to fit the model with the actual data. Several optimization algorithms under Python’s LMfit package, such as Levenberg-Marquardt, Nelder-Mead, Trust-Region Reflective and Sequential Linear Squares Programming; are employed to estimate the related parameters, in such that the numerical solution of the ODEs will fit the data with the slightest error. Nelder-Mead outperforms the other optimization algorithm with the least error. Qualitatively, the result shows that the proportion of the quarantine rule-abiding population should be maintained up to 90% to ensure Malaysia successfully reaches disease-free or endemic equilibrium.
本文提出了针对马来西亚COVID-19病例的分区易感-暴露-感染-恢复-死亡(SEIRD)模型。这个扩展模型比SIRD模型更适合于描述疾病传播,因为暴露(E)隔室代表处于疾病潜伏期的个体。该数学模型是一个具有时变系数的常微分方程(ode)系统,而不是传统的常系数模型。这种时间依赖性治疗是必要的,因为流行病学参数如感染率β、康复率γ和死亡率μ通常随时间而变化。然而,这一特征导致需要解决越来越多的未知数,以便将模型与实际数据拟合。Python LMfit包下的几种优化算法,如Levenberg-Marquardt、Nelder-Mead、Trust-Region Reflective和Sequential Linear Squares Programming;的方法来估计相关参数,从而使ode的数值解能以最小的误差拟合数据。Nelder-Mead以最小的误差优于其他优化算法。定性地说,结果表明,遵守检疫规则的人口比例应保持高达90%,以确保马来西亚成功达到无病或地方病平衡。
{"title":"Fitting Time-varying Coefficients SEIRD Model to COVID-19 Cases in Malaysia","authors":"Norsyahidah Zulkarnain, Muhammad Salihi Abdul Hadi, N. Mohammad, I. Shogar","doi":"10.11113/ijic.v13n1.397","DOIUrl":"https://doi.org/10.11113/ijic.v13n1.397","url":null,"abstract":"This paper proposes a compartmental Susceptible-Exposed-Infected-Recovered-Death (SEIRD) model for COVID-19 cases in Malaysia. This extended model is more relevant to describe the disease transmission than the SIRD model since the exposed (E) compartment represents individuals in the disease's incubation period. The mathematical model is a system of ordinary differential equations (ODEs) with time-varying coefficients as opposed to the conventional model with constant coefficients. This time dependency treatment is necessary as the epidemiological parameters such as infection rate β, recovery rate γ, and death rate μ usually change over time. However, this feature leads to an increasing number of unknowns needed to be solved to fit the model with the actual data. Several optimization algorithms under Python’s LMfit package, such as Levenberg-Marquardt, Nelder-Mead, Trust-Region Reflective and Sequential Linear Squares Programming; are employed to estimate the related parameters, in such that the numerical solution of the ODEs will fit the data with the slightest error. Nelder-Mead outperforms the other optimization algorithm with the least error. Qualitatively, the result shows that the proportion of the quarantine rule-abiding population should be maintained up to 90% to ensure Malaysia successfully reaches disease-free or endemic equilibrium.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"8 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82223515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Potential Viral Sequence from Next Generation Sequencing Data Using Convolutional Neural Network 利用卷积神经网络从下一代测序数据中检测潜在病毒序列
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-05-30 DOI: 10.11113/ijic.v13n1.382
X. Y. Lim, Jia Yee Lim, Weng Howe Chan, Hui Wen Nies
Next Generation Sequencing (NGS) is a modern sequencing technology that can determine the sequences of RNA and DNA faster and at lower cost. The availability of NGS data has sparked numerous efforts in bioinformatics, especially in the study of genetic variation and viral sequence detection. Viral sequence detection has been one of the important processes in studying virus-induced diseases. Common methods in detecting viral sequences involve alignment of the sequence with existing databases, which remains limited as these databases might be incomplete and difficult to detect highly divergent viruses. Thus, machine learning and deep learning have been used in this regard, to unveil the patterns that distinguish viral sequences through learning from the NGS data. This study focuses on viral sequence detection using convolutional neural network (CNN). This study intended to investigate how CNN model can be used for analysis of NGS data and develop a CNN model for detecting potential viral sequences from NGS data. The CNN architecture used for this study is based on an existing design that divided into two branches namely pattern and frequency branch that cater for extracting different aspects of information from the data and lastly combined into a full model. This study further implemented slightly modified architecture that includes additional convolution layer and pooling layer. Then, parameter tuning is implemented to identify near optimal parameters for the CNN to elucidate the performance impact. The evaluation of the optimized CNN model is done using a dataset with 18,445 DNA sequences. The results show that the CNN model in this study achieved a better performance compared with existing in terms of area under receiver operating characteristics curve (AUROC) for full model (+0.1434).
下一代测序(NGS)是一种能够以更快的速度和更低的成本确定RNA和DNA序列的现代测序技术。NGS数据的可用性引发了生物信息学领域的许多努力,特别是在遗传变异和病毒序列检测研究方面。病毒序列检测是研究病毒诱导疾病的重要手段之一。检测病毒序列的常用方法包括将序列与现有数据库比对,由于这些数据库可能不完整且难以检测高度分化的病毒,因此这些方法仍然有限。因此,机器学习和深度学习已被用于这方面,通过从NGS数据中学习来揭示区分病毒序列的模式。本研究的重点是利用卷积神经网络(CNN)进行病毒序列检测。本研究旨在探讨如何将CNN模型用于NGS数据的分析,并开发一个CNN模型用于从NGS数据中检测潜在的病毒序列。本研究使用的CNN架构是基于现有的设计,分为模式和频率两个分支,分别用于从数据中提取不同方面的信息,最后组合成一个完整的模型。本研究进一步实现了稍微修改的架构,包括额外的卷积层和池化层。然后,实现参数调优,为CNN识别接近最优的参数,以阐明性能影响。对优化后的CNN模型的评估使用了包含18445个DNA序列的数据集。结果表明,在全模型下,本研究的CNN模型在receiver operating characteristic curve (AUROC)下的面积(+0.1434)优于现有模型。
{"title":"Detection of Potential Viral Sequence from Next Generation Sequencing Data Using Convolutional Neural Network","authors":"X. Y. Lim, Jia Yee Lim, Weng Howe Chan, Hui Wen Nies","doi":"10.11113/ijic.v13n1.382","DOIUrl":"https://doi.org/10.11113/ijic.v13n1.382","url":null,"abstract":"Next Generation Sequencing (NGS) is a modern sequencing technology that can determine the sequences of RNA and DNA faster and at lower cost. The availability of NGS data has sparked numerous efforts in bioinformatics, especially in the study of genetic variation and viral sequence detection. Viral sequence detection has been one of the important processes in studying virus-induced diseases. Common methods in detecting viral sequences involve alignment of the sequence with existing databases, which remains limited as these databases might be incomplete and difficult to detect highly divergent viruses. Thus, machine learning and deep learning have been used in this regard, to unveil the patterns that distinguish viral sequences through learning from the NGS data. This study focuses on viral sequence detection using convolutional neural network (CNN). This study intended to investigate how CNN model can be used for analysis of NGS data and develop a CNN model for detecting potential viral sequences from NGS data. The CNN architecture used for this study is based on an existing design that divided into two branches namely pattern and frequency branch that cater for extracting different aspects of information from the data and lastly combined into a full model. This study further implemented slightly modified architecture that includes additional convolution layer and pooling layer. Then, parameter tuning is implemented to identify near optimal parameters for the CNN to elucidate the performance impact. The evaluation of the optimized CNN model is done using a dataset with 18,445 DNA sequences. The results show that the CNN model in this study achieved a better performance compared with existing in terms of area under receiver operating characteristics curve (AUROC) for full model (+0.1434).","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"50 1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76994903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Elucidating Cryptocurrency with Trading Dashboard 用交易仪表板阐明加密货币
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-05-30 DOI: 10.11113/ijic.v13n1.391
Masitah Ghazali, Alison Kuan Rong Wong
With the rise of interest in cryptocurrency in the recent decade, an ocean of financial news data has surfaced in articles, tweets, and even Reddit posts. Due to the sheer volume, it is not practical for the casual trader to read through all these news sources manually. However, only going through one or two sources alone may result in receiving biased information, or no useful information at all. With the current rise in cryptocurrency, accurately predicting market trends becomes highly beneficial to the user, providing a major opportunity for lower-income households to have a higher chance of profiting and living a substantially more comfortable lifestyle. In this study, a developer's API key was obtained for three news sources to scrape financial news from. Then, the TensorFlow Keras model and Gensim model's doc2vec NLP tool were utilized to process the data scraped online. The data is then saved as a .model and .sav file, and a website was constructed using the Flask framework. The website is now deployed and is available for all users. However, because the data obtained was too small to be utilized well, only a weak linear model that could give us a correlation between price and news sentiment was able to be constructed. The dashboard passed its functional and UAT tests with 100%, and via the usability test with SUS, the dashboard is considered to be easy to use. In all, the website summarizes the main details and sentiment of the coins and will benefit users who are just being introduced to the cryptocurrency space.
近十年来,随着人们对加密货币的兴趣日益浓厚,大量的金融新闻数据出现在文章、推特甚至Reddit帖子中。由于数量庞大,对于临时交易者来说,手动阅读所有这些新闻来源是不实际的。然而,仅仅通过一个或两个来源可能会导致接收到有偏差的信息,或者根本没有有用的信息。随着当前加密货币的兴起,准确预测市场趋势对用户非常有利,为低收入家庭提供了一个重要的机会,使他们有更高的机会获利,并过上更舒适的生活方式。在本研究中,获得了三个新闻来源的开发者API密钥,用于抓取财经新闻。然后,利用TensorFlow Keras模型和Gensim模型的doc2vec NLP工具对在线抓取的数据进行处理。然后将数据保存为.model和.sav文件,然后使用Flask框架构建一个网站。该网站现已部署完毕,可供所有用户使用。然而,由于获得的数据太少,无法很好地利用,因此只能构建一个弱线性模型,可以给我们一个价格与新闻情绪之间的相关性。仪表板100%通过了功能和UAT测试,通过SUS的可用性测试,仪表板被认为是易于使用的。总而言之,该网站总结了硬币的主要细节和情绪,并将使刚刚进入加密货币领域的用户受益。
{"title":"Elucidating Cryptocurrency with Trading Dashboard","authors":"Masitah Ghazali, Alison Kuan Rong Wong","doi":"10.11113/ijic.v13n1.391","DOIUrl":"https://doi.org/10.11113/ijic.v13n1.391","url":null,"abstract":"With the rise of interest in cryptocurrency in the recent decade, an ocean of financial news data has surfaced in articles, tweets, and even Reddit posts. Due to the sheer volume, it is not practical for the casual trader to read through all these news sources manually. However, only going through one or two sources alone may result in receiving biased information, or no useful information at all. With the current rise in cryptocurrency, accurately predicting market trends becomes highly beneficial to the user, providing a major opportunity for lower-income households to have a higher chance of profiting and living a substantially more comfortable lifestyle. In this study, a developer's API key was obtained for three news sources to scrape financial news from. Then, the TensorFlow Keras model and Gensim model's doc2vec NLP tool were utilized to process the data scraped online. The data is then saved as a .model and .sav file, and a website was constructed using the Flask framework. The website is now deployed and is available for all users. However, because the data obtained was too small to be utilized well, only a weak linear model that could give us a correlation between price and news sentiment was able to be constructed. The dashboard passed its functional and UAT tests with 100%, and via the usability test with SUS, the dashboard is considered to be easy to use. In all, the website summarizes the main details and sentiment of the coins and will benefit users who are just being introduced to the cryptocurrency space.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"103 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80731309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Question Classification for Helpdesk Support Forum Using Support Vector Machine and Naïve Bayes Algorithm 基于支持向量机和Naïve贝叶斯算法的Helpdesk支持论坛问题分类
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-05-30 DOI: 10.11113/ijic.v13n1.388
Noor Aklima Harun, S. Huspi, Noorminshah A. Iahad
The helpdesk support system is now essential in ensuring the journey of support services runs more systematically. One of the elements that contribute to the non-uniformity of the question data in the Helpdesk Support System is the diversity of services and users. Most questions asked in the system are in various forms and sentence styles but usually offer the same meaning making its hard for automation of the question classification process. This has led to problems such as the tickets being forwarded to the wrong resolver group, causing the ticket transfer process to take longer response. The key findings in the exploration results revealed that tickets with a high number of transfer transactions take longer to complete than tickets compared to no transfer transaction. Thus, this research aims to develop an automated question classification model for the Helpdesk Support System by applying supervised machine learning methods: Naïve Bayes (NB) and Support Vector Machine (SVM). The domain will use a readily available dataset from the IT Unit. The results using these techniques are then evaluated using confusion matrix and classification report evaluation, including precision, recall, and F1-Measure measurement. The outcomes showed that the SVM algorithm and TF-IDF feature extraction outperformed in terms of accuracy score compared to the NB algorithm. It is expected that this study will have a significant impact on the productivity of team technical and system owners in dealing with the increasing number of comments, feedback, and complaints presented by end-users.
帮助台支持系统现在对于确保支持服务的旅程更系统地运行至关重要。导致Helpdesk支持系统中问题数据不一致的因素之一是服务和用户的多样性。系统中提出的大多数问题都有不同的形式和句子风格,但通常提供相同的含义,这使得问题分类过程的自动化变得困难。这导致了一些问题,例如将票据转发到错误的解析器组,从而导致票据传输过程需要更长的响应时间。勘探结果的主要发现表明,与没有转让交易的票相比,有大量转让交易的票需要更长的时间才能完成。因此,本研究旨在应用监督机器学习方法:Naïve贝叶斯(NB)和支持向量机(SVM),为Helpdesk支持系统开发一个自动问题分类模型。域将使用来自IT单元的现成可用的数据集。然后使用混淆矩阵和分类报告评估来评估使用这些技术的结果,包括精度、召回率和F1-Measure测量。结果表明,SVM算法和TF-IDF特征提取在准确率得分上优于NB算法。预计这项研究将对团队技术和系统所有者在处理由最终用户提出的越来越多的评论、反馈和投诉方面的生产力产生重大影响。
{"title":"Question Classification for Helpdesk Support Forum Using Support Vector Machine and Naïve Bayes Algorithm","authors":"Noor Aklima Harun, S. Huspi, Noorminshah A. Iahad","doi":"10.11113/ijic.v13n1.388","DOIUrl":"https://doi.org/10.11113/ijic.v13n1.388","url":null,"abstract":"The helpdesk support system is now essential in ensuring the journey of support services runs more systematically. One of the elements that contribute to the non-uniformity of the question data in the Helpdesk Support System is the diversity of services and users. Most questions asked in the system are in various forms and sentence styles but usually offer the same meaning making its hard for automation of the question classification process. This has led to problems such as the tickets being forwarded to the wrong resolver group, causing the ticket transfer process to take longer response. The key findings in the exploration results revealed that tickets with a high number of transfer transactions take longer to complete than tickets compared to no transfer transaction. Thus, this research aims to develop an automated question classification model for the Helpdesk Support System by applying supervised machine learning methods: Naïve Bayes (NB) and Support Vector Machine (SVM). The domain will use a readily available dataset from the IT Unit. The results using these techniques are then evaluated using confusion matrix and classification report evaluation, including precision, recall, and F1-Measure measurement. The outcomes showed that the SVM algorithm and TF-IDF feature extraction outperformed in terms of accuracy score compared to the NB algorithm. It is expected that this study will have a significant impact on the productivity of team technical and system owners in dealing with the increasing number of comments, feedback, and complaints presented by end-users.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"111 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91362532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dental Service System into Blockchain Environment 区块链环境下的牙科服务系统
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-05-30 DOI: 10.11113/ijic.v13n1.394
R. Ismail, N. H. Abdul Wahab, Khairunnisa A. Kadir, S. H, N. Sunar, S. H. S. Ariffin, Nor Shahida Hasan, K. Wong
A platform that enables users to schedule appointments and connect with dentists is called the Dental Services System. The bulk of appointment slot orders are placed through more traditional channels, such phone calls, texts, or clinic entrances, prior to obtaining treatment. When staff members are unable to alter their status or take too long to provide information, schedule a time, or complete an assignment, this might be troublesome. Blockchain technology is a distributed ledger system that makes use of mathematics, algorithms, encryption, and financial factors. Blockchain's high-security design makes it safe, and the immutability of the data stored there helps to increase public confidence. Data storage databases that use blockchain technology and include security features that permit the exploitation of exposed user data are the main subject of the study. The blockchain may be integrated into a dental service system because of its excellence. The goal of this implementation of blockchain technology into a Dental Service System is to guarantee complete confidentiality while enabling authorized users to quickly create and get permanent records when paired with an application layer. The goal of this project is to create a tool that allows users to schedule appointments while utilizing a blockchain for safe data storage. In the end, this application will facilitate user appointment scheduling while limiting third parties' access to user data.
一个使用户能够安排预约并与牙医联系的平台被称为牙科服务系统。大部分预约订单是在获得治疗之前通过更传统的渠道,如电话、短信或诊所入口下达的。当工作人员无法更改其状态或花费太长时间来提供信息、安排时间或完成任务时,这可能会很麻烦。区块链技术是一种利用数学、算法、加密和金融因素的分布式账本系统。区块链的高安全性设计使其安全,存储在那里的数据的不变性有助于增加公众的信心。使用区块链技术并包含允许利用暴露用户数据的安全功能的数据存储数据库是该研究的主要主题。由于区块链的卓越性,它可能会被整合到牙科服务系统中。将区块链技术应用于牙科服务系统的目标是保证完全的机密性,同时使授权用户能够在与应用层配对时快速创建和获取永久记录。这个项目的目标是创建一个工具,允许用户在利用区块链进行安全数据存储的同时安排约会。最后,该应用程序将促进用户预约调度,同时限制第三方对用户数据的访问。
{"title":"Dental Service System into Blockchain Environment","authors":"R. Ismail, N. H. Abdul Wahab, Khairunnisa A. Kadir, S. H, N. Sunar, S. H. S. Ariffin, Nor Shahida Hasan, K. Wong","doi":"10.11113/ijic.v13n1.394","DOIUrl":"https://doi.org/10.11113/ijic.v13n1.394","url":null,"abstract":"A platform that enables users to schedule appointments and connect with dentists is called the Dental Services System. The bulk of appointment slot orders are placed through more traditional channels, such phone calls, texts, or clinic entrances, prior to obtaining treatment. When staff members are unable to alter their status or take too long to provide information, schedule a time, or complete an assignment, this might be troublesome. Blockchain technology is a distributed ledger system that makes use of mathematics, algorithms, encryption, and financial factors. Blockchain's high-security design makes it safe, and the immutability of the data stored there helps to increase public confidence. Data storage databases that use blockchain technology and include security features that permit the exploitation of exposed user data are the main subject of the study. The blockchain may be integrated into a dental service system because of its excellence. The goal of this implementation of blockchain technology into a Dental Service System is to guarantee complete confidentiality while enabling authorized users to quickly create and get permanent records when paired with an application layer. The goal of this project is to create a tool that allows users to schedule appointments while utilizing a blockchain for safe data storage. In the end, this application will facilitate user appointment scheduling while limiting third parties' access to user data.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"132 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85754388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparing FTP and SSH Password Brute Force Attack Detection using k-Nearest Neighbour (k-NN) and Decision Tree in Cloud Computing 云计算中基于k-最近邻(k-NN)和决策树的FTP和SSH密码暴力攻击检测比较
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-05-30 DOI: 10.11113/ijic.v13n1.386
Muhammad Fakrullah Kamarudin Shah, Marina Md-Arshad, Adlina Abdul Samad, Fuad A. Ghaleb
Cloud computing represents a new epoch in computing. From huge enterprises to individual use, cloud computing always provides an answer. Therefore, cloud computing must be readily accessible and scalable, and customers must pay only for the resources they consume rather than for the entire infrastructure. With such conveniences, come with their own threat especially brute force attacks since the resources are available publicly online for the whole world to see. In a brute force attack, the attacker attempts every possible combination of username and password to obtain access to the system. This study aims to examine the performance of the k-Nearest Neighbours (k-NN) and Decision Tree algorithms by contrasting their precision, recall, and F1 score. This research makes use of the CICIDS2017 dataset, which is a labelled dataset produced by the Canada Institute for Cybersecurity. A signature for the brute force attack is utilised with an Intrusion Detection System (IDS) to detect the attack. This strategy, however, is ineffective when a network is being attacked by a novel or unknown attack or signature. At the conclusion of the study, the performance of both algorithms is evaluated by comparing their precision, recall, and f1 score. The results show that Decision Tree performs slightly better than k-NN at classifying FTP and SSH attacks.
云计算代表了计算的新时代。从大型企业到个人使用,云计算总能提供一个答案。因此,云计算必须易于访问和扩展,并且客户必须仅为他们消耗的资源付费,而不是为整个基础设施付费。有了这样的便利,他们自己的威胁也随之而来,尤其是暴力攻击,因为资源是公开的,全世界都可以看到。在暴力攻击中,攻击者尝试所有可能的用户名和密码组合来获得对系统的访问权。本研究旨在通过比较k-最近邻(k-NN)和决策树算法的精度、召回率和F1分数来检验它们的性能。本研究使用了CICIDS2017数据集,这是加拿大网络安全研究所制作的标记数据集。暴力攻击的签名与入侵检测系统(IDS)一起用于检测攻击。然而,当网络受到新的或未知的攻击或签名攻击时,这种策略是无效的。在研究结束时,通过比较两种算法的精度、召回率和f1分数来评估它们的性能。结果表明,决策树对FTP和SSH攻击的分类性能略好于k-NN。
{"title":"Comparing FTP and SSH Password Brute Force Attack Detection using k-Nearest Neighbour (k-NN) and Decision Tree in Cloud Computing","authors":"Muhammad Fakrullah Kamarudin Shah, Marina Md-Arshad, Adlina Abdul Samad, Fuad A. Ghaleb","doi":"10.11113/ijic.v13n1.386","DOIUrl":"https://doi.org/10.11113/ijic.v13n1.386","url":null,"abstract":"Cloud computing represents a new epoch in computing. From huge enterprises to individual use, cloud computing always provides an answer. Therefore, cloud computing must be readily accessible and scalable, and customers must pay only for the resources they consume rather than for the entire infrastructure. With such conveniences, come with their own threat especially brute force attacks since the resources are available publicly online for the whole world to see. In a brute force attack, the attacker attempts every possible combination of username and password to obtain access to the system. This study aims to examine the performance of the k-Nearest Neighbours (k-NN) and Decision Tree algorithms by contrasting their precision, recall, and F1 score. This research makes use of the CICIDS2017 dataset, which is a labelled dataset produced by the Canada Institute for Cybersecurity. A signature for the brute force attack is utilised with an Intrusion Detection System (IDS) to detect the attack. This strategy, however, is ineffective when a network is being attacked by a novel or unknown attack or signature. At the conclusion of the study, the performance of both algorithms is evaluated by comparing their precision, recall, and f1 score. The results show that Decision Tree performs slightly better than k-NN at classifying FTP and SSH attacks.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"49 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86265409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the Developer Experience (DX) in Docker Supported Projects 增强Docker支持项目中的开发人员体验(DX)
IF 1 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-05-30 DOI: 10.11113/ijic.v13n1.393
Masitah Ghazali, Alfian Naufal Ravi Hidayat
Docker is undeniably powerful and revolutionary in how containerized system development is developed today, but it is apparent that the learning curve for it should be addressed, as it typically is complex at times, especially for beginners. One of the fundamental tasks in a Docker workflow is Dockerfile configurations, which at times require ample time to study and observe for attaining the best practices, even the appropriate result. This issue undeniably affects the developer experience. Developer Experience (DX), being a derived field from User Experience (UX) that has been getting traction for the past few years concerns developers’ innate ability to perceive tasks as enjoyable, painful, or perhaps some other sets of emotions. The goal of DX is to evaluate all those factors in order to improve the software development experience, which consequently affects how the project is delivered. In resonance with that, this work aims to enhance the DX by way of proposing and incorporating supporting interaction tools, both based on CLI and GUI as the interface type, with two different permutations: CLI and GUI. The DX of both has to be evaluated by the experts, who are of experienced developers, regardless of whether they have knowledge of Docker or not. The method to test and evaluate two different solutions is conducted qualitatively, with each respondent having a different order of evaluating the two solutions. The qualitative data is thematically analyzed, resulting in GUI being the best option among the two. The contribution of this research is the design guidelines for GUI and CLI-based tools development that enhance the Developer Experience (DX) in the scaffolding of Dockerfile and docker-compose.yml for projects that use Docker.
不可否认,Docker在容器化系统开发方面具有强大的革命性,但很明显,它的学习曲线应该得到解决,因为它有时通常很复杂,特别是对初学者来说。Docker工作流中的基本任务之一是Dockerfile配置,有时需要大量的时间来研究和观察以获得最佳实践,甚至是适当的结果。这个问题无疑会影响开发者的体验。开发人员体验(DX)是用户体验(UX)的衍生领域,在过去几年中一直受到关注,它涉及开发人员将任务视为愉快、痛苦或其他一些情绪的天生能力。DX的目标是评估所有这些因素,以改进软件开发体验,从而影响项目的交付方式。与此相呼应,这项工作旨在通过提出和整合支持交互工具的方式来增强DX,这些工具基于CLI和GUI作为界面类型,具有两种不同的排列:CLI和GUI。两者的DX都必须由经验丰富的开发人员的专家来评估,而不管他们是否具有Docker知识。测试和评估两种不同解决方案的方法是定性地进行的,每个受访者对两种解决方案的评估顺序不同。对定性数据进行主题分析,从而使GUI成为两者中的最佳选择。这项研究的贡献是为基于GUI和cli的工具开发提供了设计指南,这些工具在Dockerfile和docker-compose的框架中增强了开发者体验(DX)。使用Docker的项目。
{"title":"Enhancing the Developer Experience (DX) in Docker Supported Projects","authors":"Masitah Ghazali, Alfian Naufal Ravi Hidayat","doi":"10.11113/ijic.v13n1.393","DOIUrl":"https://doi.org/10.11113/ijic.v13n1.393","url":null,"abstract":"Docker is undeniably powerful and revolutionary in how containerized system development is developed today, but it is apparent that the learning curve for it should be addressed, as it typically is complex at times, especially for beginners. One of the fundamental tasks in a Docker workflow is Dockerfile configurations, which at times require ample time to study and observe for attaining the best practices, even the appropriate result. This issue undeniably affects the developer experience. Developer Experience (DX), being a derived field from User Experience (UX) that has been getting traction for the past few years concerns developers’ innate ability to perceive tasks as enjoyable, painful, or perhaps some other sets of emotions. The goal of DX is to evaluate all those factors in order to improve the software development experience, which consequently affects how the project is delivered. In resonance with that, this work aims to enhance the DX by way of proposing and incorporating supporting interaction tools, both based on CLI and GUI as the interface type, with two different permutations: CLI and GUI. The DX of both has to be evaluated by the experts, who are of experienced developers, regardless of whether they have knowledge of Docker or not. The method to test and evaluate two different solutions is conducted qualitatively, with each respondent having a different order of evaluating the two solutions. The qualitative data is thematically analyzed, resulting in GUI being the best option among the two. The contribution of this research is the design guidelines for GUI and CLI-based tools development that enhance the Developer Experience (DX) in the scaffolding of Dockerfile and docker-compose.yml for projects that use Docker.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"47 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76875545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Innovative Computing Information and Control
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1